Security test of Windows Server
Note: this was converted using from LaTeX to Markdown using Chat GPT 4.1 the original pdf can be found here along with the bibliography Testing Windows server security Laboratory protocol Exercise 9: Testing Windows server security Figure: Grouplogo Subject: ITSI Class: 3AHITN Name: Stefan Fürst, Justin Tremurici Group Name/Number: Name here/12 Supervisor: SPAC, ZIVK Exercise dates: 14.03.2025 | 21.03.2025 | 28.03.2025 | 04.04.2025 Submission date: 11.04.2025 Table of Contents Task definition Summary Complete network topology of the exercise Exercise Execution Setting Up the Exercise Environment Brute-Forcing SMB with Hydra Analyzing Network Traffic with Wireshark Brute-Forcing RDP Explaining My Own RDP Brute-Forcing Script Analyzing Network Traffic with Wireshark (RDP) Hardening Windows Against Brute-Force Attacks Using EvLWatcher for Rate Limiting Disabling NTLM Authentication Configuring Login Timeout Settings Mimikatz: An Introduction What Can Mimikatz Do? How to Use Mimikatz Running Mimikatz Using Polyglot Files to Conceal Mimikatz DLL Side-Loading to Attempt to Bypass Windows Defender How to Detect and Block Mimikatz References Task definition This task was conducted using a combination of manual configuration and automated attack tools to evaluate the security posture of a Windows Server environment. The environment setup involved preparing both the target system and an attacker system running Kali Linux, which was equipped with tools such as Hydra for brute-force attacks and Wireshark for network traffic analysis. ...